[ Date Index ][
Thread Index ]
[ <= Previous by date /
thread ]
[ Next by date /
thread => ]
On Tue, 2002-06-25 at 10:26, Simon Waters wrote:
Theo de Raadt announced that the OpenBSD team is working with ISS on a remote exploit for OpenSSH (a free implementation of the Secure SHell protocol). They are refusing to provide any details on the vulnerability but instead are advising everyone to upgrade to the latest release, version 3.3.Seems ISS treat them better than the Apache team, or maybe they learnt their lesson? Haven't seen anything suggesting the Apache bug is exploitable on Linux, but I wouldn't take the chance.Theo made it very clear this new version does not fix the vulnerability
So whats the point in upgrading then ??
This doesn't sound like good news.
Nope.. Neil
Attachment:
signature.asc
Description: This is a digitally signed message part